In this guide, we’ll walk through the steps to create a Kubernetes user with restricted permissions. We will also include instructions on creating a Linux…
Linux cheat sheet
In this guide, we’ll walk through the steps to create a Kubernetes user with restricted permissions. We will also include instructions on creating a Linux…
Full disk encryption (FDE) ensures that all data on your disk is encrypted, requiring a passphrase or key file to unlock at boot. In this…
In Kubernetes, node labels are a powerful feature that allows you to organize and categorize your nodes based on their attributes. By using node labels,…
Immutable systems, such as Fedora CoreOS, are designed for minimal changes and higher reliability. Fedora CoreOS is a Linux distribution optimized for containerized workloads, providing…
In the evolving landscape of containerization, Docker has emerged as an essential tool for developers seeking streamlined application deployment. Among the recent advancements in this…
In modern DevOps practices, securing sensitive information like API tokens, passwords, and other credentials is paramount. Vault, an open-source tool developed by HashiCorp, provides a…
Kubernetes continues to grow in popularity, leading to an increased deployment of clusters in production environments. Amidst this surge, security considerations sometimes take a backseat.…
Secure Shell (SSH) is a widely used protocol for secure remote access to servers. One way to enhance the security of your servers is by…
Kubernetes is a powerful container orchestration platform that simplifies the deployment, scaling, and management of containerised applications. MicroK8s, a lightweight Kubernetes distribution, is a popular…